Commons
The work that belongs to everyone. Frameworks, workshop kits, and civic texts — released under CC BY so they can be used, adapted, and built upon without asking.
All materials are licensed CC BY 4.0 unless otherwise noted. Commercial use encouraged — just give credit. These resources are not legal advice and are provided as-is.
XSTR.epoch
A Technical Paper on global coordination requirements for 2038-class rollover events.
Under development at ITU-T Study Group 17. Revision 1 was submitted
on 18 May 2026 and runs approximately 100 pages, with a cross-sector
exposure survey across thirty-one sectors against the Hayes (2005/2014)
infrastructure taxonomy. The document develops the case that three
timekeeping events arriving within a three-year window — the Network
Time Protocol era rollover on 7 February 2036, the overflow of 32-bit
signed Unix time_t on 19 January 2038, and the next GPS
week-number rollover on 20 November 2038 — together constitute a
category of global infrastructure risk that requires coordinated
international response.
Pre-publication under ITU-T review. The linked page is TLP:CLEAR background; the document itself is TLP:GREEN pending publication. Substantive reviewer engagement welcome before Revision 2 (December 2026).
The Hippocratic Oath of the Cybersecurity Practitioner
Primum non nocere.
An oath for practitioners — on honesty, restraint, uncertainty, stewardship, and the obligations that outlast the work itself.
Offered as a tool, not a credential.
On Constraints
A sonnet for the maintainers, the shepherds, and those who hold the line.
A short poem for the people who keep the fire, the watch, the vigil-tree — the FOSS volunteers, the standards stewards, the incident responders, the unfunded labour at the foundation of the systems everyone else depends on. Fourteen lines about constraints, the commons, and the work that goes uncounted.
Offered as a tool, not a credential.
The Friend Protocol
Principles for hard conversations among people who want to do them well.
A small set of principles that two or more people can agree to use together — so that when a difficult conversation tilts, they have somewhere to return to that does not require anyone to be the one who notices first. Nine principles plus eight annexes for the conditions that make conversations harder: asymmetry, status, time pressure, identity, capacity, state, and the seasons that are larger than any single day.
Offered as a tool, not a credential.
Knights Chess
A chess variant for thinking about decision-making when the rules themselves are unstable.
Both kings begin in check. The pieces are configured in ways that violate ordinary chess geometry. Standard rules about check and checkmate are suspended for an opening phase that ends not by move count but by the first capture — which, once made, snaps every ordinary rule immediately and fully back into force. A teaching artefact for decision-making under polycrisis conditions, debuted at ITU-T SG17 in December 2025.
Offered as a tool, not a credential.
On the Undecidability of Instruction Boundaries in Unified Representation Systems — Or: Why Prompt Injection Is Not a Bug
A proof that prompt injection is not a software bug awaiting a patch — it is a structural consequence of unified representation system expressiveness, by reduction to Rice's theorem. Connects ninety years of pattern across Gödel (1931), Von Neumann (1945), and contemporary LLMs (2020s). With implications for security architecture, system design, and procurement policy.
Working draft, v0.9. Privately circulated since December 2025 in search of co-authors; now published openly for critique. Refinement expected. Co-authors and reviewers welcome.
The Gödel–Chaitin Modeling Boundary — Or, Why There's No Digital Twin for Causality
A proof that the same formal boundary — Kolmogorov incompressibility, Lyapunov instability, Gödelian incompleteness, and Chaitinian randomness — manifests across three domains: digital twins of complex systems, language-theoretic security, and prompt injection in large language models. The claim: these are not separate engineering problems but a single mathematical constraint on self-describing systems, encountered from different angles.
Working draft, v0.9. Privately circulated since December 2025 in search of co-authors; now published openly for critique. Refinement expected. Co-authors and reviewers welcome.
The Meridian Protocol
A proposed Internet standard for prospective web preservation, authorized mirroring, and DNS failover. Meridian gives authors a way to authorize preservation of their sites before they go dark — with cryptographically verifiable, URL-preserving failover to live mirrors.
Early draft — seeking co-authors, implementers, and mirror operators. Get in touch if that’s you.
2038-Class Risk Exposure Matrix
A free, open framework for assessing systemic infrastructure risk (time-related or otherwise), with a complete workshop kit for running your own internal sessions.
Building on the Matrix: a CC-BY 30-minute executive briefing workshop (deck + facilitation plan) for C-level and policy audiences is in development. If you have experience facilitating in government or corporate leadership environments and want to help beta test it in a small, vetted group, contact me with a sentence or two on your context and why you can help make this framing land.